ICCWS 2014 Home
   Call for Papers
   Submission Info
   Abstract Submission
   Proof Reading
   Committee
   Abstracts Selected
   Programme
   Registration
   Practical Information
   Proceedings 2013
   ICIW Past & Future
   Seminars
   Advertisers
   Exhibitors
   Publishers
   Sponsors
   About ACI
   Academic Bookshop
   Ethics Policy
  ICCWS 2014
  24-25 March, West Lafayette, Indiana, USA
  Home >> iciw >> ICIW 2014 >> ICCWS 2014 call for papers
WWW ACI   At a glance Calendar RSS Feed Contact us

 

 

 

 

 

 

CALL FOR PAPERS, Case Studies, Work in Progress/Posters, PhD Research, Round Table Proposals, non-academic Contributions and Product Demonstrations for the 9th International Conference on Cyber Warfare and Security ICCWS-2014

 


Click here to download
a .PDF version of the main CFP

 

 

Read the
Submission Guidelines



















 

ICCWS 2014 is an opportunity for academics, practitioners and consultants from around the world who are involved in the study, management, development and implementation of systems and concepts to combat information warfare or to improve information systems security to come together and exchange ideas. There are several strong strands of research and interest that are developing in the area including the understanding of threats and risks to information systems, the development of a strong security culture, as well as incident detection and post incident investigation. This conference is continuing to establish itself as a key event for individuals working in the field from around the world.


Please consider submitting to this conference.  We are interested in the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations. 


Publication opportunity

Papers accepted for the conference will be published in the conference proceedings, subject to author registration and payment.


Selected papers that have been presented at the Conference will be considered for publication in a special issue of the Journal of Information Warfare: http://www.jinfowar.com and the
International Journal of Cyber Warfare and Terrorism (IJCWT) published by Information Resources Management Association, USA.( DOI: 10.4018/IJCWT, ISSN: 1947-3435, EISSN: 1947-3443). Additionally, selected papers from the conference will be considered for publication in the International Journal of Electronic Security and Digital Forensics published by Inderscience UK (ISSN:1751-1911X).


The advisory group for the conference invites submissions of both academic and practitioner papers on a wide range of topics and a wide range of scholarly approaches including theoretical and empirical papers employing qualitative, quantitative and critical methods. Academic research papers, case studies and work-in-progress/posters are welcomed approaches. PhD Research, proposals for roundtable discussions, non-academic contributions and product demonstrations based on the main themes are also invited. You can find full details in the submission types document (.pdf format).


In addition to the main conference topics below, the advisory group invites submissions to the following mini tracks:

 

 

 

Submission details are given below. Topics for submissions may include, but are not limited to:

 

  • Cyberwarfare practice and theory
  • The politics of cyberwarfare, including conceptual cyberarms agreements
  • Cyber-exploitation execution and detection
  • Information security practice
  • Information security management
  • Dual-use technologies
  • Cyber conflict - Neural linguistic techniques in cyberwarfare
  • Patriotic hackers as an extension of state power
  • Potential military uses of cyber attacks
  • Case studies of cyber attacks in modern conflicts
  • Theoretical cyber conflict scenarios
  • Cyber conflict frameworks
  • Human Factors
  • Cyber-terrorism
  • Principles of i-Warfare
  • Physical security
  • Counter-terrorism security policies, procedures and legislation
  • Information warfare policy
  • SMEs - Small-to-medium Size Enterprises Security model
  • Critical national infrastructure protection
  • Information warfare theory
  • Security implications of “virtualised machines and services
  • e-Health systems as part of a national critical infrastructure
  • Information warfare techniques
  • The Resilience and Susceptibility of "Service Oriented Architectures" (SOAs)
  • Information security governance and management
  • Information warfare and security education
  • Hacking
  • Biometrics
  • Attribution of threat actors
  • e-Intelligence/counter-intelligence
  • Information Assurance
  • Cryptography
  • Networked Centric War
  • Malware
  • Wireless Threats
  • Reflector attacks
  • UCE
  • Threat Agents – Insider threats
  • Art of war
  • Cyber-fraud
  • Particle swarm data mining
  • Computers-as-weapons
  • Risk Management
  • Virtual Intrusion Detection
  • Electro-magnetic pulse weapons
  • Collaborative decision making
  • National security policy
  • Information operations
  • Security policy
  • Acute situational awareness
  • Strategic leadership
  • Firewalls
  • Aircraft Environment
  • Influence campaigns
  • Phishing and spam
  • Digital forensics
  • Psychological warfare
  • Current Anti Virus Technologies
  • Network anomaly detection models
  • PSYOP - PSYOPS
  • Mobile Virus
  • Corporate defence mechanisms
  • Perception management
  • RFID Virus
  • Security for small to medium enterprises
  • Infra-structure warfare
  • SQL Infections
  • Information, computer and network security
  • Military Culture Topography
  • Data Loss
  • Security of the virtual worlds
  • Modern conflict
  • Data Integration
  • SIMAD what can/should be done to protect against this threat?
  • Military approaches
  • ISO 27001
  • Unidirectional linguistic steganography
  • Compromise path analysis
  • Gaussian empirical rule
  • IT auditing and compliance
  • Defence steganography
  • Natural computing
  • Information Security Architecture
  • Data and service integration
  • Random numbers approximation sequence
  • Artificial immune recognition system security infrastructure
  • Legal issues concerned with information warfare and e-Crime
  • Traffic classification
  • Public Key Infrastructure
  • Non-traditional enemies
  • Subliminal Channel
  • Network Address Translator
  • Ethical, political and social issues relating to information warfare
  • Machine Learning Risk
  • Mathematical-filtering
  • Association of Religions with Warfare
  • Context free grammers
  • SecureMDA
  • Image-processing

 

 

 

Mini track call for papers on Managing Risk to Sourced Products in a Time of InfoWar   Click the .pdf icon to download the file

Mini track chair: Dr Dan Shoemaker, Centre for Cyber Security and Intelligence Studies, University of Detroit Mercy, USA


Dan Shoemaker

 

 

This track solicits ideas aimed at ensuring that COTS and other forms of outsourced information and communications technology (ICT) products and services are delivered free of exploitable defects, or malicious items.


This is a critical topic because the global supply chains that provide these products are presently not controlled and invite exploitation. The weakest link analogy applies best to the concept of any hostile nation state or bad actor utilizing a vulnerability in a supply chain to threaten our national security. So this problem has to be resolved.


Submissions may include, but are not restricted to:

 

·       General methods practices or technologies to assure:

·       Against risk from the insertion of malicious code into ICT products

·       Against risk from the insertion or use of  counterfeit technologies

 

·        Against risk from the accidental creation of exploitable defects

·        Against risk from supply chain breakdowns or denials of service

·        A sufficient level  of  competency among all participants in the supply chain risk management process

 

Submissions can be made on-line directly on the Abstract submission page

 

 

Mini track call for papers on Political and Social Aspects of Cyber War and Hacking   Click the .pdf icon to download the file

Mini track chair: Dr. Michael Dahan, Sapir College, Israel.


Michael Dahan

 

 

The proposed mini-track seeks to explore the “softer”, non technological aspects of cyber war and hacking, contextualizing these within a wider social science framework in order to provide both researchers and security professionals with a deeper and broader understanding and insight.


Papers will ideally range from the political/social aspects (including but not limited to: goals, strategies, ideology, motivations, media strategy, int'l relations, philosophy) to research focused on effects/affects (for example physiological and metabolic effects of cyber terror/war/hacking on individuals and society) as well as cultural aspects of hacking.


Submissions may include, but are not restricted to:

 

  • Hacker Ideology/motivation
  • Hackers as Government Proxies
  • Effects and Affects of Cyber war/Cyber terror/Hacking
  • Philosophical Aspects of Cyber war

 

  • Cyber war and International Relations
  • Aspects of Cyber-defence
  • Media and Cyber war/Hacktivism/Cyber terror
  • Hacktivism and political mobilization

 

Submissions can be made on-line directly on the Abstract submission page

 

 

Mini track call for papers on Cyber Security, Cyberwar and Cyberlaw   Click the .pdf icon to download the file

Mini track co-chairs: Daniel J.Ryan, National Defense University, Washington, DC and Dr. Julie J. C. H. Ryan, George Washington University, Washington, DC, USA


Dan Ryan


Julie Ryan

 

 

The law in this area continues to evolve rapidly, including analyses of International Humanitarian Law and the Laws of Armed Conflict as they apply to Cyberwar, issues with attribution, and proposals for cyber security legislation in Washington DC.


Now with Stuxnet as an example of precision attacks with physical world consequences, the nexus between legal and technical perspectives provides a rich area for research and discussion.


Submissions may include, but are not restricted to:

 

  • The Laws of Armed Conflict in the context of cyber war
  • Attribution in cyber incidents
  • Cyber security vs. cyber war
  • Cyber warfare vs kinetic warfare
  • The right of self defence in cyber incidents
  • Other related topics

 

Submissions can be made on-line directly on the Abstract submission page

 

 

Participants will be asked to vote for the best poster and a prize will be given for the poster receiving the highest number of votes. Additionally a prize will be awarded to the best PhD paper presented at the conference.

 

 

Submission details

Abstract details:

All submission types require an abstract in the first instance. The Abstract should be a minimum of 300 and no more than 500 words including keywords to be received by 2 September 2013  Please read the Abstract Guidelines section of the website before submitting.

Submission:

Online via the submission form. Please ensure that you complete all relevant sections of the form, including the conference track the abstract is intended for, the proposed title for the paper, the full names (first name and surname, not initials) and email addresses of all authors and a postal address and telephone number for at least one  contact author. Please indicate clearly if the contact author is not the lead author. Please take the time to read the Submission Info page for a complete description of submission types and how to submit.

Full paper:

Only required when the abstract has been selected and not to be more than 5,000 words including abstract, keywords and references (the Harvard referencing rules need to be followed). Submission date will be no later than 21 October 2013. Authors are advised that this is a final date. Earlier submission of the full paper helps us to manage the review process in a timely manner. Papers should be submitted as .doc or .rtf file attachments by email to Charlotte Hall with the paper submission checklist and copyright form.

Due to the large number of papers expected for this conference, the committee prefers that an author presents only one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee. Author registration and payment must be completed by (to be determined) and there are special discounts available for earlybird registration and group bookings, including a special reduced rate for supervisors and students attending together

 

Important information

§            The selection panel of the conference committee will consider all abstracts received by the submission deadline to ensure that the proposed paper is relevant to the Conference.

§            The authors of abstracts that describe a relevant paper will receive a notification of abstract selection.

§            All full papers will be double-blind reviewed by members of the conference committee to ensure an adequate standard, that the proposed subject of their abstract has been followed, that the paper is of a suitable length, the standard of English is adequate and the paper is appropriately referenced.

§            For authors whose first language is not English we request that you have your work proof read prior to submission by a native English speaker (or at least a fluent English speaker). Papers can be rejected due to a poor standard of English. We do offer proof-reading services.

§            Papers that are accepted will be published in the conference proceedings providing at least one author registers and presents the work at the Conference (see the registration section of the conference website for more information about registration). Author registration and payment must be completed by 17 February 2014.

§           Due to the large number of papers expected for this conference, the committee only allows an author to present one paper. However, if multiple papers are accepted for publication and presentation, each paper requires a separate registration fee.


 

 

Proceedings for previous ICIW conferences can be purchased from our bookshop by clicking on the Purchase proceedings button.

 

 

 

Important Dates

 

 

Abstract submission deadline:

 2 September 2013

  Extended until 17 September 2013

 

Notification of abstract acceptance:

 9 September 2013

  Completed

 

Full paper due for review:

 21 October 2013

  Completed

 

Notification of paper acceptance(with any requested changes):

 30 December 2013

  Completed

 

Earlybird registration closes

 13 January 2014

  Now closed

 

Final paper due (with changes):

 27 January 2014

  Completed

 

Final author registration date

 17 February 2014

 

 

 

 

 

 

 

This page was last updated on the 28 January 2014

 

 

 

 

 

 

 

 

Academic Conferences and Publishing Internatinal Limited - 33 Wood Lane, Sonning Common, RG4 9SJ, UK - Tel: +44 (0)1189 724148 - Fax: +44 (0)1189 724691
eMail: info@academic-conferences.org- Copyright 2013 Academic Conferences and Publishing International Limited - registered in England - No: 06233418 - VAT No: 141 0393 52